Identity-based encryption resilient to continuous key leakage (Englisch)
Freier Zugriff
- Neue Suche nach: Zhou, Yanwei
- Neue Suche nach: Yang, Bo
- Neue Suche nach: Mu, Yi
- Neue Suche nach: Wang, Tao
- Neue Suche nach: Wang, Xin
- Neue Suche nach: Zhou, Yanwei
- Neue Suche nach: Yang, Bo
- Neue Suche nach: Mu, Yi
- Neue Suche nach: Wang, Tao
- Neue Suche nach: Wang, Xin
In:
IET Information Security
;
13
, 5
;
426-434
;
2019
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:Identity-based encryption resilient to continuous key leakage
-
Beteiligte:Zhou, Yanwei ( Autor:in ) / Yang, Bo ( Autor:in ) / Mu, Yi ( Autor:in ) / Wang, Tao ( Autor:in ) / Wang, Xin ( Autor:in )
-
Erschienen in:IET Information Security ; 13, 5 ; 426-434
-
Verlag:
- Neue Suche nach: The Institution of Engineering and Technology
-
Erscheinungsdatum:02.04.2019
-
Format / Umfang:9 pages
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:selective identity model , private information , leakage parameter , continuous leakage setting , security requirement , CLR-IBE scheme , chosen-plaintext attacks security , identity-based encryption schemes , leakage-resilient IBE scheme , permitted leakage , chosen-ciphertext attacks security , bounded leakage attacks , cryptography scheme , continuous leakage attacks , cryptography , leakage requirements , continuous key leakage , adaptive CCA security , continuous leakage amplified property
-
Datenquelle:
Metadata by IET is licensed under CC BY 3.0
Inhaltsverzeichnis – Band 13, Ausgabe 5
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 411
-
Improved guess-and-determine attack on TRIVIUMJiao, Lin / Hao, Yonglin / Li, Yongqiang et al. | 2019
- 420
-
ESR analysis over ST-MRC multi-input multi-output Nakagami fading channelsWang, Jin-Yuan / Lin, Sheng-Hong / Cai, Wei / Dai, Jianxin et al. | 2019
- 426
-
Identity-based encryption resilient to continuous key leakageZhou, Yanwei / Yang, Bo / Mu, Yi / Wang, Tao / Wang, Xin et al. | 2019
- 435
-
Causal analysis of attacks against honeypots based on properties of countriesZuzčák, Matej / Bujok, Petr et al. | 2019
- 448
-
S-boxes representation and efficiency of algebraic attackArabnezhad-Khanoki, Hossein / Sadeghiyan, Babak / Pieprzyk, Josef et al. | 2019
- 459
-
Multi-designated verifiers signature schemes with threshold verifiability: generic pattern and a concrete scheme in the standard modelRastegari, Parvin / Dakhilalian, Mohammad / Berenjkoub, Mehdi / Susilo, Willy et al. | 2019
- 469
-
New zero-sum distinguishers on full 24-round Keccak-f using the division propertyYan, Hailun / Lai, Xuejia / Wang, Lei / Yu, Yu / Xing, Yiran et al. | 2019
- 479
-
New method to describe the differential distribution table for large S-boxes in MILP and its applicationLi, Ling-Chen / Wu, Wen-Ling / Zhang, Lei / Zheng, Ya-Fei et al. | 2019
- 486
-
Inline high-bandwidth network analysis using a robust stream clustering algorithmNoferesti, Morteza / Jalili, Rasool et al. | 2019
- 498
-
Escrowed decryption protocols for lawful interception of encrypted dataNuñez, David / Agudo, Isaac / Lopez, Javier et al. | 2019
- 508
-
Sigma protocol for faster proof of simultaneous homomorphism relationsBagherpour, Bagher / Zaghian, Ali / Sajadieh, Mahdi et al. | 2019
- 515
-
Research on highly non-linear plateaued functionsSun, Tianfeng / Hu, Bin / Yang, Yang et al. | 2019